Improving GC Cyber Security Health: Security Policy Implementation Notice (2024)

On this page

  1. Effective date
  2. Purpose
  3. Scope
  4. Application
  5. Context
  6. Direction
  7. Compliance monitoring
  8. Enquiries

1. Effective date

This Security Policy Implementation Notice (SPIN) is effective as of August 14, 2024.

2. Purpose

The purpose of this SPIN is to reinforce requirements under the Policy on Government Security and the Policy on Service and Digital in order to:

  • reduce the overall attack surface and minimize the risk of unauthorized access to GC information systems as soon as possible
  • aggressively remediate known exploited vulnerabilities to protect federal information systems and reduce cyber incidents
  • make measurable progress toward enhancing visibility into departmental assets and associated vulnerabilities

3. Scope

This SPIN applies to any Government of Canada (GC) information system (departmental or enterprise), that collects, processes, stores, transmits, disseminates or otherwise maintains GC information and data. This includes, but is not limited to:

  • servers and workstations, virtual machines, routers and switches, firewalls, network appliances, and network printers — whether in on-premises, roaming or cloud-based environments
  • all software and hardware found on federal information systems managed on-premises or in GC-managed cloud-based environments
  • all IP-addressable networked assets that can be reached over IPv4 and IPv6 protocols

The scope excludes ephemeral assets, such as containers and third party-managed software as a service (SaaS) solutions.

4. Application

This SPIN applies to the organizations listed in section6 of the Policy on Government Security.

5. Context

The GC, like all other government and private sector organizations around the world, faces a dynamic and challenging cyber threat environment. These threats can exploit vulnerabilities and improperly configured network devices or can use activities such as phishing to gain access to government information. Inadequate security, misconfigurations and out-of-date software of Internet-accessible assets make network security devices more vulnerable to exploitation. The risk is further compounded if device management interfaces are connected directly to and accessible from the public-facing internet.

Given the increasing sophistication and frequency of cyber attacks, now more than ever the GC must be cyber vigilant. Recent cyber incidents serve as a reminder that cyber security is a shared responsibility across the GC. Without proper cyber security measures, departments and agencies are vulnerable and at risk of compromise.

All departments and agencies play a critical role in ensuring the confidentiality, integrity and availability of the GC’s information and networks.

According to the Directive on Security Management, deputy heads have a duty and responsibility to ensure the protection of information systems under their organization’s custody and/or control. These responsibilities include:

  • safeguarding the confidentiality, integrity and availability of GC information and information technology (IT) assets
  • implementing appropriate measures to assure the protection of personal information

As the GC’s common IT service provider, Shared Services Canada (SSC) is mandated to provide secure, reliable IT services to its partner clients. Within this shared responsibility model, there are interdependencies between SSC infrastructure and the applications that are delivered by departmental programs and services.

Collaboration across departments and agencies will be essential in improving cyber security and resilience for the GC.

6. Direction

To improve the cyber security health of federal information systems, the GC must continue to take deliberate steps to ensure the security of IT assets across the federal enterprise. As per Appendix B of the Directive on Security Management, and to ensure that cyber security risks to the GC are reduced according to section4.4.1.9 of the Policy on Service and Digital, departments and agencies will:

  • assess threats to information systems that support departmental activities, hold departmental information, or hold information under the custody or control of the department (sectionB.2.2.1 of the Directive on Security Management)
  • manage the configuration of information systems to maintain known and approved system and component designs, settings, parameters and attributes (sectionB.2.3.3 of the Directive on Security Management)
  • implement measures to protect information systems, their components and the information they process and transmit (sectionB.2.3.7 of the Directive on Security Management)

The following subsections outline required actions on GC information systems in scope of this SPIN.

6.1 Identify assets

Continuous and comprehensive asset visibility, along with the monitoring of these assets, is critical to the understanding and effective management of cyber security risks to the GC enterprise network.

Within 3months of issuance, departments and agencies will:

  • 6.1.1 review departmental records of information systems that support departmental critical services and activities in the TBS Office of the Chief Information Officer (OCIO)’s Application Portfolio Management (APM) tool or comparable tool and update as appropriate
  • 6.1.2 confirm whether the Canadian Centre for Cyber Security (Cyber Centre)’s host-based sensors have been deployed on all client endpoints (laptops, desktops) (section1.5.1 of the Endpoint Management Configuration Requirements). If they have not been implemented, contact Cyber Centre’s Cyber Defence Operations (CDO) Service Deployments for support
  • 6.1.3 confirm whether Cyber Centre’s cloud-based sensors have been deployed according to the Government of Canada Cloud Guardrails. If they have not been implemented, contact Cyber Centre’s CDO Service Deployments for support

6.2 Understand exposure

Understanding the security exposure of assets enables a risk-based approach for prioritization of mitigation measures.

Within 6months of issuance, departments and agencies will:

  • 6.2.1 for departments that do not receive network services from SSC, develop a plan to identify and assess network devices under their management to ensure that they are securely configured and hardened (for example, disabling access to network device management interfaces from the Internet), leveraging SSC hardening standards or industry best practices such as the Center for Internet Security (CIS) Benchmarks
  • 6.2.2 develop a plan to identify, assess and remediate applicable vulnerabilities from the Top25 Vulnerabilities List that has been developed by TBS, in collaboration with the Cyber Centre and SSC, following a risk-based approach with priority given to information systems that are publicly accessible
  • 6.2.3 develop an emergency patch management plan that will ensure that departmental procedures are in place, with clear roles and responsibilities outlined to support the execution of emergency patches to address critical vulnerabilities, in accordance with the GC Patch Management Guidance, and in consideration of the SSC Patch Management Standard
  • 6.2.4 onboard departmental publicly accessible systems into Cyber Centre’s National Cyber Threat Notification System, in collaboration with TBS and Cyber Centre, to ensure that departments are notified of misconfigured services, vulnerabilities and compromised infrastructure on their IP space

Within 6months of issuance, SSC will:

  • 6.2.5 develop a plan to identify and assess network devices under their management to ensure that they are securely configured and hardened (for example, disabling access to network device management interfaces from the Internet, forwarding events to a central log facility), leveraging SSC hardening standards or industry best practices such as the Center for Internet Security (CIS) Benchmarks
  • 6.2.6 develop a plan to identify, assess and remediate applicable vulnerabilities from the Top25 Vulnerabilities List that has been developed by TBS, in collaboration with the Cyber Centre and SSC, with priority given to SSC-managed infrastructure that poses the greatest risk

6.3 Reduce exposure

Reduce the GC’s overall attack surface and strengthen safeguards to minimize the risk of unauthorized access to federal information systems.

Within 9months of issuance, departments and agencies will:

  • 6.3.1 for departments not receiving network services from SSC, implement mitigations based on the action plan developed in section6.2.1 to address non-compliant perimeter network devices to ensure that they are securely hardened and configured with a priority on devices at the edge of the GC’s enterprise network
  • 6.3.2 implement mitigations to address the applicable vulnerabilities from the Top25 Vulnerabilities List based on the action plan developed in section6.2.2 with a priority focus on information systems that are publicly accessible
  • 6.3.3 employ secure remote access configurations that:
    • 6.3.3.1 enforce multifactor authentication (section2.1 of the Remote Access Configuration Requirements) with security measures in place to achieve phishing resistance for the overall authentication process, such as ensuring that the user is authenticating from a GC-managed device, verifying the device is configured properly, and detecting anomalous geolocations according to the guidance from the Cyber Centre’s “User authentication guidance for information technology systems” (ITSP.30.031 v3)
    • 6.3.3.2 provide a secure, encrypted connection to the GC enterprise network (section3.1 of the Remote Access Configuration Requirements) using GC-approved pathways to the Internet rather than via a direct connection to the Internet, in order to leverage the Cyber Centre’s cyber defences (section3.2 of the Remote Access Configuration Requirements) with the exception of domains that are included in the split tunneling list approved by GC Enterprise Architecture Review Board (section1.4 of the Endpoint Management Configuration Requirements)

7. Compliance monitoring

For an outline of the consequences of non‑compliance, refer to the Framework for Management of Compliance (AppendixC: Consequences for Institutions and AppendixD: Consequences for Individuals).

TBS will perform active cyber verification of the GC’s perimeter and publicly accessible systems to ensure that potentially exposed devices and interfaces are identified and evaluated for potential vulnerabilities and remediated as appropriate by departments.

TBS will monitor departmental progress and will engage departmental senior officials, such as the chief information officer (CIO), chief security officer (CSO), and designated official for cyber security (DOCS), as necessary and appropriate, when the department has not met the direction (required actions) deadlines specified above.

SSC will provide periodic updates to the IT Security Tripartite on progress at remediating the Top25 Vulnerabilities List and non-compliant perimeter network devices under their management, along with the associated implementation status of their plans.

8. Enquiries

For additional information or clarification regarding this SPIN, address enquiries to:

TBS Cyber Security

Improving GC Cyber Security Health: Security Policy Implementation Notice (2024)

References

Top Articles
33 Vegan Christmas Recipes
Chicken Francese Recipe; Without Wine
AllHere, praised for creating LAUSD’s $6M AI chatbot, files for bankruptcy
Froedtert Billing Phone Number
Faint Citrine Lost Ark
Paris 2024: Kellie Harrington has 'no more mountains' as double Olympic champion retires
Affidea ExpressCare - Affidea Ireland
Kraziithegreat
Kent And Pelczar Obituaries
Shariraye Update
World History Kazwire
ATV Blue Book - Values & Used Prices
Facebook Marketplace Charlottesville
Shemal Cartoon
Oro probablemente a duna Playa e nomber Oranjestad un 200 aña pasa, pero Playa su historia ta bay hopi mas aña atras
Stihl Km 131 R Parts Diagram
The ULTIMATE 2023 Sedona Vortex Guide
Jackson Stevens Global
Khiara Keating: Manchester City and England goalkeeper convinced WSL silverware is on the horizon
Pjs Obits
Barber Gym Quantico Hours
Free Personals Like Craigslist Nh
Piri Leaked
Essence Healthcare Otc 2023 Catalog
Netwerk van %naam%, analyse van %nb_relaties% relaties
Student Portal Stvt
Villano Antillano Desnuda
Generator Supercenter Heartland
Kiddie Jungle Parma
Siskiyou Co Craigslist
Manuel Pihakis Obituary
Sun-Tattler from Hollywood, Florida
Royal Caribbean Luggage Tags Pending
When His Eyes Opened Chapter 2048
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Tryst Houston Tx
Ezpawn Online Payment
Luciane Buchanan Bio, Wiki, Age, Husband, Net Worth, Actress
Rage Of Harrogath Bugged
Grizzly Expiration Date Chart 2023
Mychart University Of Iowa Hospital
Rocket Lab hiring Integration & Test Engineer I/II in Long Beach, CA | LinkedIn
Oklahoma City Farm & Garden Craigslist
Vagicaine Walgreens
Movie Hax
Google Flights Missoula
O'reilly's On Marbach
Grandma's Portuguese Sweet Bread Recipe Made from Scratch
Thrift Stores In Burlingame Ca
Duffield Regional Jail Mugshots 2023
Factorio Green Circuit Setup
Latest Posts
Article information

Author: Trent Wehner

Last Updated:

Views: 6129

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Trent Wehner

Birthday: 1993-03-14

Address: 872 Kevin Squares, New Codyville, AK 01785-0416

Phone: +18698800304764

Job: Senior Farming Developer

Hobby: Paintball, Calligraphy, Hunting, Flying disc, Lapidary, Rafting, Inline skating

Introduction: My name is Trent Wehner, I am a talented, brainy, zealous, light, funny, gleaming, attractive person who loves writing and wants to share my knowledge and understanding with you.